Analysis

  • max time kernel
    160s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 22:15

General

  • Target

    c3bc13cab300f6f1f5f4e66abdf6fa1a04bf97310d5f98fa060fdf5c8e5b76d4.exe

  • Size

    176KB

  • MD5

    76daf69d6b2a19c9565d52a326e9a730

  • SHA1

    7a8e75437957abccb4977578eb61aa056b9715fb

  • SHA256

    c3bc13cab300f6f1f5f4e66abdf6fa1a04bf97310d5f98fa060fdf5c8e5b76d4

  • SHA512

    d931c1fd2cad53245a70884d10c4fcb83ac1293e921350bb91def0227f8ed8f217b27c8dffaed0c58ef51706242326a204d05bc77112dab0e9fbe7f682de09c0

  • SSDEEP

    1536:bs+KLBCVi9NMIYuQASmS0mJJFL/XlvpjJaHxlmJUl60ReWWKI0pj8YQa2odbdt/2:IBqASmSjXy20pjz24TU

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3bc13cab300f6f1f5f4e66abdf6fa1a04bf97310d5f98fa060fdf5c8e5b76d4.exe
    "C:\Users\Admin\AppData\Local\Temp\c3bc13cab300f6f1f5f4e66abdf6fa1a04bf97310d5f98fa060fdf5c8e5b76d4.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Users\Admin\rehex.exe
      "C:\Users\Admin\rehex.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rehex.exe

    Filesize

    176KB

    MD5

    41537c04fd6f7ba20f79ea56d42e5601

    SHA1

    f5285030c49249f733750b1f02ec1615d9ca5444

    SHA256

    89d45c69c0debac9cc1fcd1e3010bd54b4db73c69705649c466791e4f43023e9

    SHA512

    6c91dc29747d898b3c26124a2933b0f628e4f24809db577fb460c8d7a19d548f9812327b57650ffdaef39db1a48a86bc402e8574fa102c37b34c714ef6c64e9e

  • C:\Users\Admin\rehex.exe

    Filesize

    176KB

    MD5

    41537c04fd6f7ba20f79ea56d42e5601

    SHA1

    f5285030c49249f733750b1f02ec1615d9ca5444

    SHA256

    89d45c69c0debac9cc1fcd1e3010bd54b4db73c69705649c466791e4f43023e9

    SHA512

    6c91dc29747d898b3c26124a2933b0f628e4f24809db577fb460c8d7a19d548f9812327b57650ffdaef39db1a48a86bc402e8574fa102c37b34c714ef6c64e9e

  • memory/1468-134-0x0000000000000000-mapping.dmp